Optimal dismantling of criminal networks. A perspective from the mathematical and computational modeling
This work deals with the study and comparison of different strategies for the optimal dismantling of delinquent networks, which aim to optimally identify the most relevant individuals in the network. The strategy of greater complexity that we have studied here, is based on the Katz-Bonacich centrali...
- Autores:
-
Sarmiento Bahoque, Tomas Angel
Cantillo Palacio, John Fredys
Realpe Gómez, John Eduardo
Montoya Martínez, Javier Antonio
- Tipo de recurso:
- Fecha de publicación:
- 2016
- Institución:
- Universidad EAFIT
- Repositorio:
- Repositorio EAFIT
- Idioma:
- spa
- OAI Identifier:
- oai:repository.eafit.edu.co:10784/11293
- Acceso en línea:
- http://publicaciones.eafit.edu.co/index.php/ingciencia/article/view/3293
http://hdl.handle.net/10784/11293
- Palabra clave:
- Complex systems
computational modeling
network models
game theory
delinquent networks
statistical mechanics
ICT
Sistemas complejos
modelado computacional
modelos en redes
teoría de juegos
redes delincuenciales
mecánica estadística
TICs
- Rights
- License
- Copyright (c) 2016 Ingeniería y Ciencia | ing.cienc.
id |
REPOEAFIT2_873cafb9da89e7d1dc2afe20cb5b5143 |
---|---|
oai_identifier_str |
oai:repository.eafit.edu.co:10784/11293 |
network_acronym_str |
REPOEAFIT2 |
network_name_str |
Repositorio EAFIT |
repository_id_str |
|
dc.title.eng.fl_str_mv |
Optimal dismantling of criminal networks. A perspective from the mathematical and computational modeling |
dc.title.spa.fl_str_mv |
Desmantelamiento óptimo de redes delincuenciales. Una perspectiva desde el modelado matemático y computacional |
title |
Optimal dismantling of criminal networks. A perspective from the mathematical and computational modeling |
spellingShingle |
Optimal dismantling of criminal networks. A perspective from the mathematical and computational modeling Complex systems computational modeling network models game theory delinquent networks statistical mechanics ICT Sistemas complejos modelado computacional modelos en redes teoría de juegos redes delincuenciales mecánica estadística TICs |
title_short |
Optimal dismantling of criminal networks. A perspective from the mathematical and computational modeling |
title_full |
Optimal dismantling of criminal networks. A perspective from the mathematical and computational modeling |
title_fullStr |
Optimal dismantling of criminal networks. A perspective from the mathematical and computational modeling |
title_full_unstemmed |
Optimal dismantling of criminal networks. A perspective from the mathematical and computational modeling |
title_sort |
Optimal dismantling of criminal networks. A perspective from the mathematical and computational modeling |
dc.creator.fl_str_mv |
Sarmiento Bahoque, Tomas Angel Cantillo Palacio, John Fredys Realpe Gómez, John Eduardo Montoya Martínez, Javier Antonio |
dc.contributor.author.none.fl_str_mv |
Sarmiento Bahoque, Tomas Angel Cantillo Palacio, John Fredys Realpe Gómez, John Eduardo Montoya Martínez, Javier Antonio |
dc.subject.keyword.eng.fl_str_mv |
Complex systems computational modeling network models game theory delinquent networks statistical mechanics ICT |
topic |
Complex systems computational modeling network models game theory delinquent networks statistical mechanics ICT Sistemas complejos modelado computacional modelos en redes teoría de juegos redes delincuenciales mecánica estadística TICs |
dc.subject.keyword.spa.fl_str_mv |
Sistemas complejos modelado computacional modelos en redes teoría de juegos redes delincuenciales mecánica estadística TICs |
description |
This work deals with the study and comparison of different strategies for the optimal dismantling of delinquent networks, which aim to optimally identify the most relevant individuals in the network. The strategy of greater complexity that we have studied here, is based on the Katz-Bonacich centrality criteria as a measure of influence of the individuals in the network. This results in an NP-hard type of problem, therefore, in order to apply that criteria, we must use heuristic methods which allow us to find approximate solutions. In particular, the methods used in this work are the Monte Carlo and greedy algorithms. We compared their performance against less sophisticated strategies and we were able to find that these algorithms perform relatively better, which contributes to improve our understanding of these approaches. In addition, we discuss a model that was recently introduced, which justifies the use of Katz-Bonacich centrality from the point of view of game theory on networks. |
publishDate |
2016 |
dc.date.issued.none.fl_str_mv |
2016-11-22 |
dc.date.available.none.fl_str_mv |
2017-04-03T16:10:27Z |
dc.date.accessioned.none.fl_str_mv |
2017-04-03T16:10:27Z |
dc.date.none.fl_str_mv |
2016-11-11 |
dc.type.eng.fl_str_mv |
info:eu-repo/semantics/article info:eu-repo/semantics/publishedVersion article publishedVersion |
dc.type.coarversion.fl_str_mv |
http://purl.org/coar/version/c_970fb48d4fbd8a85 |
dc.type.coar.fl_str_mv |
http://purl.org/coar/resource_type/c_6501 http://purl.org/coar/resource_type/c_2df8fbb1 |
dc.type.local.spa.fl_str_mv |
Artículo |
status_str |
publishedVersion |
dc.identifier.issn.none.fl_str_mv |
2256-4314 1794–9165 |
dc.identifier.uri.none.fl_str_mv |
http://publicaciones.eafit.edu.co/index.php/ingciencia/article/view/3293 http://hdl.handle.net/10784/11293 |
dc.identifier.doi.none.fl_str_mv |
10.17230/ingciencia.12.24.4 |
identifier_str_mv |
2256-4314 1794–9165 10.17230/ingciencia.12.24.4 |
url |
http://publicaciones.eafit.edu.co/index.php/ingciencia/article/view/3293 http://hdl.handle.net/10784/11293 |
dc.language.iso.none.fl_str_mv |
spa |
language |
spa |
dc.relation.isversionof.none.fl_str_mv |
http://publicaciones.eafit.edu.co/index.php/ingciencia/article/view/3293 |
dc.rights.spa.fl_str_mv |
Copyright (c) 2016 Ingeniería y Ciencia | ing.cienc. http://creativecommons.org/licenses/by/4.0 |
dc.rights.coar.fl_str_mv |
http://purl.org/coar/access_right/c_abf2 |
dc.rights.local.spa.fl_str_mv |
Acceso abierto |
rights_invalid_str_mv |
Copyright (c) 2016 Ingeniería y Ciencia | ing.cienc. http://creativecommons.org/licenses/by/4.0 Acceso abierto http://purl.org/coar/access_right/c_abf2 |
dc.format.none.fl_str_mv |
application/pdf |
dc.publisher.spa.fl_str_mv |
Universidad EAFIT |
dc.source.none.fl_str_mv |
instname:Universidad EAFIT reponame:Repositorio Institucional Universidad EAFIT |
dc.source.eng.fl_str_mv |
Ingeniería y Ciencia | ing.cienc.; Vol 12, No 24 (2016); 83-103 |
dc.source.spa.fl_str_mv |
Ingeniería y Ciencia | ing.cienc.; Vol 12, No 24 (2016); 83-103 |
instname_str |
Universidad EAFIT |
institution |
Universidad EAFIT |
reponame_str |
Repositorio Institucional Universidad EAFIT |
collection |
Repositorio Institucional Universidad EAFIT |
bitstream.url.fl_str_mv |
https://repository.eafit.edu.co/bitstreams/0499c4d0-fd2b-41d8-b112-b0fc3c47988c/download https://repository.eafit.edu.co/bitstreams/46f66c77-5649-4a81-b1d8-19583fd206e4/download https://repository.eafit.edu.co/bitstreams/abab77a8-1214-4941-944c-7497593d3485/download |
bitstream.checksum.fl_str_mv |
260ef3f593260a377e41a42014d04121 209e5406296ed7ffa03a1364d84c9276 da9b21a5c7e00c7f1127cef8e97035e0 |
bitstream.checksumAlgorithm.fl_str_mv |
MD5 MD5 MD5 |
repository.name.fl_str_mv |
Repositorio Institucional Universidad EAFIT |
repository.mail.fl_str_mv |
repositorio@eafit.edu.co |
_version_ |
1814110591493603328 |
spelling |
2016-11-112017-04-03T16:10:27Z2016-11-222017-04-03T16:10:27Z2256-43141794–9165http://publicaciones.eafit.edu.co/index.php/ingciencia/article/view/3293http://hdl.handle.net/10784/1129310.17230/ingciencia.12.24.4This work deals with the study and comparison of different strategies for the optimal dismantling of delinquent networks, which aim to optimally identify the most relevant individuals in the network. The strategy of greater complexity that we have studied here, is based on the Katz-Bonacich centrality criteria as a measure of influence of the individuals in the network. This results in an NP-hard type of problem, therefore, in order to apply that criteria, we must use heuristic methods which allow us to find approximate solutions. In particular, the methods used in this work are the Monte Carlo and greedy algorithms. We compared their performance against less sophisticated strategies and we were able to find that these algorithms perform relatively better, which contributes to improve our understanding of these approaches. In addition, we discuss a model that was recently introduced, which justifies the use of Katz-Bonacich centrality from the point of view of game theory on networks.El objetivo de este trabajo es estudiar y comparar diferentes estrategias para el desmantelamiento óptimo de redes delincuenciales, las cuales están representadas en algoritmos que permiten la identificación óptima de los individuos claves en la red. La estrategia de mayor complejidad se basa en la métrica de centralidad de Katz-Bonacich como medida de influencia en la red, y da lugar a un problema NP-difícil por lo que se debe recurrir a métodos heurísticos para encontrar soluciones aproximadas. Aquí se desarrolla un algoritmo basado en el método Monte Carlo y se compara con un método basado en algoritmos voraces introducido recientemente en la literatura. En este trabajo se compara además el desempeño de éstos con estrategias menos sofisticadas y se proporciona evidencia que dichos algoritmos se desempeñan relativamente bien, contribuyendo así a proporcionar un mejor entendimiento de éstos. Se discute además un modelo introducido recientemente que justifica el uso de la centralidad de Katz-Bonacich desde el punto de vista de la teoría de juegos sobre redes.application/pdfspaUniversidad EAFIThttp://publicaciones.eafit.edu.co/index.php/ingciencia/article/view/3293Copyright (c) 2016 Ingeniería y Ciencia | ing.cienc.http://creativecommons.org/licenses/by/4.0Acceso abiertohttp://purl.org/coar/access_right/c_abf2instname:Universidad EAFITreponame:Repositorio Institucional Universidad EAFITIngeniería y Ciencia | ing.cienc.; Vol 12, No 24 (2016); 83-103Ingeniería y Ciencia | ing.cienc.; Vol 12, No 24 (2016); 83-103Optimal dismantling of criminal networks. A perspective from the mathematical and computational modelingDesmantelamiento óptimo de redes delincuenciales. Una perspectiva desde el modelado matemático y computacionalinfo:eu-repo/semantics/articleinfo:eu-repo/semantics/publishedVersionarticlepublishedVersionArtículohttp://purl.org/coar/version/c_970fb48d4fbd8a85http://purl.org/coar/resource_type/c_6501http://purl.org/coar/resource_type/c_2df8fbb1Complex systemscomputational modelingnetwork modelsgame theorydelinquent networksstatistical mechanicsICTSistemas complejosmodelado computacionalmodelos en redesteoría de juegosredes delincuencialesmecánica estadísticaTICsSarmiento Bahoque, Tomas AngelCantillo Palacio, John FredysRealpe Gómez, John EduardoMontoya Martínez, Javier AntonioIngeniería y Ciencia122483103ing.ciencORIGINALdocument (38).pdfdocument (38).pdfTexto completo PDFapplication/pdf660337https://repository.eafit.edu.co/bitstreams/0499c4d0-fd2b-41d8-b112-b0fc3c47988c/download260ef3f593260a377e41a42014d04121MD51articulo.htmlarticulo.htmlTexto completo HTMLtext/html374https://repository.eafit.edu.co/bitstreams/46f66c77-5649-4a81-b1d8-19583fd206e4/download209e5406296ed7ffa03a1364d84c9276MD53THUMBNAILminaitura-ig_Mesa de trabajo 1.jpgminaitura-ig_Mesa de trabajo 1.jpgimage/jpeg265796https://repository.eafit.edu.co/bitstreams/abab77a8-1214-4941-944c-7497593d3485/downloadda9b21a5c7e00c7f1127cef8e97035e0MD5210784/11293oai:repository.eafit.edu.co:10784/112932020-03-01 17:51:12.753open.accesshttps://repository.eafit.edu.coRepositorio Institucional Universidad EAFITrepositorio@eafit.edu.co |